QID 150574

Date Published: 2022-09-27

QID 150574: Atlassian Bitbucket Server and Data Center - Command Injection Vulnerability (CVE-2022-36804)

Bitbucket is a Git-based source code repository hosting service owned by Atlassian.

In affected versions of Atlassian Bitbucket Server and Data Center a Command Injection Vulnerability exists in multiple API endpoints where an attacker with access to a public repository or with read permissions to a private Bitbucket repository can execute arbitrary code by sending a malicious HTTP request.

Affected versions :
Atlassian Bitbucket Server and Data Center version from 7.0.0 before version 7.6.17
Atlassian Bitbucket Server and Data Center version from 7.7.0 before version 7.17.10
Atlassian Bitbucket Server and Data Center version from 7.18.0 before version 7.21.4
Atlassian Bitbucket Server and Data Center version from 8.0.0 before version 8.0.3
Atlassian Bitbucket Server and Data Center version from 8.1.0 before version 8.1.3
Atlassian Bitbucket Server and Data Center version from 8.2.0 before version 8.2.2
Atlassian Bitbucket Server and Data Center version from 8.3.0 before version 8.3.1

QID Detection Logic: (Unauthenticated)
This QID sends specially crafted HTTP GET request with command injection payloads where vulnerable servers will execute system commands or make a DNS query that will trigger Qualys Periscope detection mechanism.

Successful exploitation of this vulnerability could allow an attacker with access to a public Bitbucket repository or with read permissions to a private one can execute arbitrary code on the target system.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as Critical - 10 severity.
  • Solution
    Vendor has released fix for this vulnerability. Customers are advised to refer to Bitbucket Security Advisory for more information pertaining to this vulnerability.

    CVEs related to QID 150574

    Software Advisories
    Advisory ID Software Component Link
    Bitbucket downloads URL Logo www.atlassian.com/software/bitbucket/download-archives